Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pull-Request [Zettelkasten-10-23-2024] from Obsidian #31

Merged
merged 48 commits into from
Oct 23, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
48 commits
Select commit Hold shift + click to select a range
eb67899
PUSH NOTE : Cybersecurity.md
BravishkaSkytano Oct 23, 2024
0d507e8
PUSH NOTE : L2. Data Privacy.md
BravishkaSkytano Oct 23, 2024
dd0e55d
PUSH NOTE : L1. Introduction to Cybersecurity.md
BravishkaSkytano Oct 23, 2024
bcaf365
PUSH NOTE : M1. Data and Privacy.md
BravishkaSkytano Oct 23, 2024
c0a5061
PUSH NOTE : MC1. Governance, Risk, Compliance, and Data Privacy.md
BravishkaSkytano Oct 23, 2024
2fc9038
PUSH NOTE : IBM SkillsBuild Cybersecurity Certificate.md
BravishkaSkytano Oct 23, 2024
cfa6c69
PUSH NOTE : M1. Get Started with Web Development.md
BravishkaSkytano Oct 23, 2024
d6e07d4
PUSH NOTE : Introduction to the Course.md
BravishkaSkytano Oct 23, 2024
2bfb7d9
PUSH NOTE : 2. Core Internet Technologies.md
BravishkaSkytano Oct 23, 2024
9c9255f
PUSH NOTE : 1.1 How The Internet Works.md
BravishkaSkytano Oct 23, 2024
02e3abd
PUSH NOTE : 1. How The Web Works.md
BravishkaSkytano Oct 23, 2024
2892fb6
PUSH NOTE : C1. Introduction to Front-End Development.md
BravishkaSkytano Oct 23, 2024
95682cb
PUSH NOTE : Meta Front-End Developer Professional Certificate.md
BravishkaSkytano Oct 23, 2024
98583fd
PUSH NOTE : Study Notes.md
BravishkaSkytano Oct 23, 2024
444b189
PUSH NOTE : SOC2110.md
BravishkaSkytano Oct 23, 2024
5313f85
PUSH NOTE : REL1010.md
BravishkaSkytano Oct 23, 2024
f709b36
PUSH NOTE : PHL113.md
BravishkaSkytano Oct 23, 2024
97da06d
PUSH NOTE : ENG101.md
BravishkaSkytano Oct 23, 2024
ab20638
PUSH NOTE : what-is-feminism.md
BravishkaSkytano Oct 23, 2024
4511e9b
PUSH NOTE : hr-5.md
BravishkaSkytano Oct 23, 2024
1b8d075
PUSH NOTE : Persuasive Speech Prep.md
BravishkaSkytano Oct 23, 2024
36a26df
PUSH NOTE : Informative Speech Prep Rewrite.md
BravishkaSkytano Oct 23, 2024
9d6ebb0
PUSH NOTE : Informative Speech Prep.md
BravishkaSkytano Oct 23, 2024
5327250
PUSH NOTE : COM101.md
BravishkaSkytano Oct 23, 2024
4f9be42
PUSH NOTE : BIB235.md
BravishkaSkytano Oct 23, 2024
df045ae
PUSH NOTE : W5 Audio Lectures.md
BravishkaSkytano Oct 23, 2024
61cdb3b
PUSH NOTE : W4-audio-lectures.md
BravishkaSkytano Oct 23, 2024
3db5d6a
PUSH NOTE : W3-audio-lectures.md
BravishkaSkytano Oct 23, 2024
cdf529b
PUSH NOTE : one-horned-goat.md
BravishkaSkytano Oct 23, 2024
799e5c3
PUSH NOTE : four-horns.md
BravishkaSkytano Oct 23, 2024
e318caa
PUSH NOTE : antiochus-epiphanes.md
BravishkaSkytano Oct 23, 2024
68e84a6
PUSH NOTE : APO391.md
BravishkaSkytano Oct 23, 2024
25f18fe
PUSH NOTE : _index.md
BravishkaSkytano Oct 23, 2024
d5f0c40
PUSH NOTE : journal.md
BravishkaSkytano Oct 23, 2024
e26afc6
DELETE FILE : content/journal/Journal.md
BravishkaSkytano Oct 23, 2024
b59d9f8
DELETE FILE : content/study-notes/BIB235/W3-audio-lectures.md
BravishkaSkytano Oct 23, 2024
d6006da
DELETE FILE : content/study-notes/BIB235/W4-audio-lectures.md
BravishkaSkytano Oct 23, 2024
26f90b1
DELETE FILE : content/study-notes/BIB235/W5 Audio Lectures.md
BravishkaSkytano Oct 23, 2024
1a85235
DELETE FILE : content/study-notes/BIB235/antiochus-epiphanes.md
BravishkaSkytano Oct 23, 2024
298b80e
DELETE FILE : content/study-notes/BIB235/four-horns.md
BravishkaSkytano Oct 23, 2024
e5adde7
DELETE FILE : content/study-notes/BIB235/one-horned-goat.md
BravishkaSkytano Oct 23, 2024
faf77f7
DELETE FILE : content/study-notes/COM101/informative-speech-prep-rewr…
BravishkaSkytano Oct 23, 2024
b8317e5
DELETE FILE : content/study-notes/COM101/informative-speech-prep.md
BravishkaSkytano Oct 23, 2024
14e4df1
DELETE FILE : content/study-notes/COM101/persuasive-speech-prep.md
BravishkaSkytano Oct 23, 2024
9152b69
DELETE FILE : content/study-notes/ENG101/hr-5.md
BravishkaSkytano Oct 23, 2024
c0148f7
DELETE FILE : content/study-notes/ENG101/what-is-feminism.md
BravishkaSkytano Oct 23, 2024
0af9982
DELETE FILE : content/study-notes/meta-front-end-developer/course-1/m…
BravishkaSkytano Oct 23, 2024
ae33e83
DELETE FILE : content/study-notes/meta-front-end-developer/course-1/m…
BravishkaSkytano Oct 23, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
37 changes: 37 additions & 0 deletions content/Study Notes/APO391/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
---
title: APO391 Introduction to Islam
description: This course will introduce the student primarily to the history and theology of the religion of Islam. Special emphasis will be given to topics such as the life of Mohammad, the Qur'an and the "Golden Age of Islam" (10th-13th centuries). The course will also include introductory information on Christian apologetics to Muslims.
date: 2024-10-21T11:27:49
lastmod: 2024-10-23T16:56:02
banner: https://images.unsplash.com/photo-1616422840391-fa670d4b2ae7?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzNjAwOTd8MHwxfHNlYXJjaHw3fHxpc2xhbXxlbnwwfDB8fHwxNzI5NTI3NDAyfDA&ixlib=rb-4.0.3&q=80&w=1080
categories:
- course
tags:
- seedling
- apologetics
links:
- title: Unsplash
description: Photo by Ali Burhan on Unsplash
website: https://unsplash.com/@cahiwak?utm_source=Obsidian%20Image%20Inserter%20Plugin&utm_medium=referral
---

```folder-overview
id: 30bb184e-3d20-4c28-95b0-f4b646c52796
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ tags:
- branch
- prophesy
- symbolism
- apologetics
---
## [Daniel 10:1](Daniel%2010.md#1)[](Daniel%2010.md#2)[](Daniel%2010.md#3)[](Daniel%2010.md#4)[](Daniel%2010.md#5)[](Daniel%2010.md#6)[](Daniel%2010.md#7)[](Daniel%2010.md#8)[-9](Daniel%2010.md#9)
- Cyrus the Persian and Darius the Mede are different
Expand Down
30 changes: 30 additions & 0 deletions content/Study Notes/BIB235/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
---
title: BIB235
description:
date: 2024-10-23T16:56:09
lastmod:
banner:
categories:
tags: seedling
---

```folder-overview
id: 794b427d-5bcc-4e1d-b8f2-529d760db01d
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Informative Speech Prep Rewrite
description:
date: 2024-10-16T11:50:00
lastmod: 2024-10-21T11:13:43
lastmod: 2024-10-23T17:08:49
banner:
categories:
- essay
Expand All @@ -12,7 +12,7 @@ tags:
- crochet
- design
---
[Informative Speech Prep](./informative-speech-prep.md)
[Informative Speech Prep](./Informative%20Speech%20Prep.md)

I think that all of you have come across a crocheted item at least once in your life, have you ever wondered how they were made? What about how they were designed? Greetings, ladies and gentlemen, my name is Yoela Olson, and I am a crochet designer who specializes in designing bags. Designing a crochet item and actually making it are two different things. Making follows a process of replicating something that someone else designed; but, designing requires you to start from a blank slate, or template, and add your own touches. Designing is usually more difficult than making the project itself, which is why most crocheters will spend hours searching for and collecting patterns for things they want to make instead of figuring out how to make it themselves.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Informative Speech Prep
description: The introduction for my informative speech
date: 2024-10-16T11:12:00
lastmod: 2024-10-21T17:55:26
lastmod: 2024-10-23T17:08:33
banner:
categories:
- essay
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Persuasive Speech Prep
description: An outline for my persuasive speech.
date: 2024-10-16T11:03:00
lastmod: 2024-10-20T23:42:50
lastmod: 2024-10-23T17:09:14
banner:
categories:
- essay
Expand Down
38 changes: 38 additions & 0 deletions content/Study Notes/COM101/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
title: COM101 Speech Communication
description:
date: 2024-10-16T14:54:55
lastmod: 2024-10-23T17:07:37
banner: https://images.unsplash.com/photo-1530811761207-8d9d22f0a141?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzNjAwOTd8MHwxfHNlYXJjaHw5fHxzcGVlY2h8ZW58MHwwfHx8MTcyOTU0Nzg2MXww&ixlib=rb-4.0.3&q=80&w=1080
categories:
- course
tags:
- tree
- speech
links:
- title: Jason Leung (@ninjason) | Unsplash Photo Community
description: Photo by Jason Leung on Unsplash
website: https://unsplash.com/@ninjason?utm_source=Obsidian%20Image%20Inserter%20Plugin&utm_medium=referral
---
This course introduces learners to the art of public speaking. Throughout the course, learners will write, organize, and develop the skills to deliver meaningful speeches, and grow in their ability to communicate effectively.

```folder-overview
id: 6943c4ee-ebdf-4f52-93da-3c39a14a49d5
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
32 changes: 32 additions & 0 deletions content/Study Notes/ENG101/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
---
title: ENG101 English
description:
date: 2024-10-18T18:59:29
lastmod: 2024-10-20T22:54:00
banner:
categories:
- course
tags:
- tree
---

```folder-overview
id: 32fed52d-a42e-40b5-b6d5-657836454821
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ categories:
tags:
- branch
- feminism
- MeToo
---
## INTRODUCTION

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
---
description: What is cybersecurity?
date: 2024-10-23T17:36:10
lastmod: 2024-10-23T17:56:36
banner:
categories:
- lesson
- branch
tags:
- branch
---
Secrecy, or [confidentiality](confidentiality.md), means that only authorized people should be able to access or read specific computer systems and data.

[Integrity](Integrity.md) means that only authorized people should be able to use or modify systems and data.

Cybersecurity helps minimize crime and harm in the virtual world. It’s a set of techniques used to protect the secrecy, integrity, and availability of computer systems and data against threats.

[Authentication](Authentication.md) is the process by which a computer understands who it is interacting with. There are 3 types: what you know, what you have, and what you are.

Permissions, or [Access Control Lists](Access%20Control%20Lists.md) (ACLS) describe the access each user has to view or modify any file, or program, on a computer.

[Malicious software](Malicious%20software.md) (malware) can make a program or computing system vulnerable to attacks that copy user data and allow hackers to disguise as the user.

Some hack for amusement and curiosity, others for monetary gain ([cybercriminals](cybercriminals.md)), and others hack to provide a social or political goal ([hacktivists](hacktivists.md)).

[Black Hat hackers](Black%20Hat%20hackers.md) steal, exploit, and sell computer vulnerabilities and data. [White Hat hackers](White%20Hat%20hackers.md) are hired by companies and governments to perform security evaluations, hunt for bugs, and try to close security holes.

Attackers use bugs in a system to gain access to computer systems to overwrite data, steal user data, crash systems, or hijack the whole system.

Unresolved bugs on enough systems opens up the possibility of “[worms](worms.md),” programs that automatically jump from computer to computer.

[Cryptography](Cryptography.md) includes the most common forms of computer security. System architects employ them to make info secret and frustrate attackers.

A [cipher](cipher.md) is an algorithm that converts plain text into ciphertext that can’t be read unless you have a key to undo the cipher. *Think encryption and decryption.*

[Cryptographic techniques](Cryptographic%20techniques.md) rely on keys known by both sender and recipient.

[Key exchange](Key%20exchange.md) uses an algorithm that lets 2 computers agree on a key without sending one, using one-way functions (math operations) that are easy to do in one direction, but hard to reverse. *Think paint mixtures.*

[Symmetric keys](Symmetric%20keys.md) are the same on both sides and are used by the sender and receiver to encrypt and decrypt.

[Asymmetric encryption](Asymmetric%20encryption.md) uses two different keys (1 public, 1 private). Senders use the public key, recipient uses their own private key.
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
---
description:
date: 2024-10-23T17:58:34
lastmod: 2024-10-23T18:12:47
banner:
categories:
- lesson
- branch
tags:
- seedling
---
[Cybersecurity](../../Cybersecurity.md) is the practice of protecting and recovering data, networks, devices, and programs from malicious cyberattacks.

Anything that can lead to harmful events for your network, system, or data is called a [threat](threat.md). While a [vulnerability](vulnerability.md) is a weakness in hardware, firmware, or software that hackers can exploit.

Someone who tries to bypass system or network security to access data would be known as a [hacker](hacker.md). But an unauthorized hacker who acts with malicious purposes is a [cyberattacker](cyberattacker.md).

[Malware](Malware.md) is software or firmware intended to conduct unauthorized actions that negatively affect system security. One example of this is a [trojan](trojan.md), an innocent-looking program that secretly gives an attacker access to your device.

Key elements of cybersecurity:

- **People** involves cybersecurity knowledge and habits of individuals, including their choices regarding network security.
- **Processes** refer to the relevant processes that you're expected to follow wherever you use your device(s).
- **Technology** includes to the infrastructure and tools for protecting it.
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
---
description:
date: 2024-10-23T18:13:08
lastmod: 2024-10-23T18:14:20
banner:
categories:
tags: seedling
---
Types of data:
- Public
- Confidential
- Proprietary
- Private
- personally identifiable info
- Protected health info

Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
---
description: In this module, you’ll explore cybersecurity, including its key elements and the threats it addresses. You’ll learn about data privacy, including the different types of sensitive data and the consequences that organizations face when data breaches occur. Then, you’ll discover how organizations evaluate data security using the CIA triad, an industry-standard information security model. You’ll also learn about data security controls used to combat cybersecurity threats. You’ll explore two of these controls in depth, encryption and backups, and you’ll even practice developing a data backup plan.
date: 2024-10-23T17:18:07
lastmod: 2024-10-23T17:19:03
banner:
categories:
- module
tags:
- seedling
title: M1. Data and Privacy
---
## Learning Objectives

- Determine ways in which the three key elements of cybersecurity apply to common tasks
- Categorize the various types of sensitive data that organizations must protect
- Apply the CIA triad to real-world situations
- Apply file and drive encryption
- Develop a plan for backup

```folder-overview
id: 3bd25c73-70c8-4d85-a45b-9110c8ae7f3e
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
---
description:
date: 2024-10-23T17:16:39
lastmod: 2024-10-23T17:17:23
banner:
categories:
- microcredential
tags:
- tree
title: MC1. Governance, Risk, Compliance, and Data Privacy
---

```folder-overview
id: 6649ab82-d349-46a2-be55-14c9a9084b61
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
---
description: As technology advances, ensuring the security of digital assets and protecting the online presence of individuals and organizations have emerged as critical priorities. Every industry now finds itself in need of skilled cybersecurity professionals. Whether you are a beginner exploring the field or an experienced professional seeking to expand your knowledge, this course will provide you with a solid foundation in cybersecurity. You will delve into key concepts, terminology, and essential principles, and engage in activities with tools, frameworks, and scenarios to help you apply and practice what you’ve learned.
date: 2024-10-23T17:10:09
lastmod: 2024-10-23T17:43:50
banner: https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=M3wzNjAwOTd8MHwxfHNlYXJjaHwxfHxjeWJlcnNlY3VyaXR5fGVufDB8MHx8fDE3Mjk3MTk3MzJ8MA&ixlib=rb-4.0.3&q=80&w=1080
categories:
- certificate
tags:
- tree
links:
- title: Adi Goldstein (@adigold1) | Unsplash Photo Community
description: Photo is by Adi Goldstein on Unsplash
website: https://unsplash.com/@adigold1?utm_source=Obsidian%20Image%20Inserter%20Plugin&utm_medium=referral
title: IBM SkillsBuild Cybersecurity Certificate
---
As technology advances, ensuring the security of digital assets and protecting the online presence of individuals and organizations have emerged as critical priorities. Every industry now finds itself in need of skilled cybersecurity professionals. Whether you are a beginner exploring the field or an experienced professional seeking to expand your knowledge, this course will provide you with a solid foundation in cybersecurity. You will delve into key concepts, terminology, and essential principles, and engage in activities with tools, frameworks, and scenarios to help you apply and practice what you’ve learned.

## Learning Outcomes

- Evaluate an organization’s data security posture 
- Perform an impact analysis to address vulnerabilities 
- Design a secure network that includes systems and security devices 
- Ensure the protection of cloud systems, data, applications, and infrastructure 
- Assemble the components required for security operations and monitoring 
- Investigate incident reports through digital forensics
```folder-overview
id: daff71b2-bf58-4485-ac27-1eaa7a67ade2
folderPath: ""
title: "{{folderName}} overview"
showTitle: false
depth: 3
includeTypes:
- folder
- markdown
- pdf
style: list
disableFileTag: false
sortBy: name
sortByAsc: true
showEmptyFolders: false
onlyIncludeSubfolders: false
storeFolderCondition: true
showFolderNotes: false
disableCollapseIcon: true
```
Loading
Loading